Metrics
Affected Vendors & Products
No advisories yet.
Solution
This issue is fixed in Genetec Update Service 2.10.600 and all later versions. Internet connected Genetec Update Service will automatically update themselves.
Workaround
No workaround given by the vendor.
Thu, 26 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Genetec
Genetec update Service |
|
| Vendors & Products |
Genetec
Genetec update Service |
Tue, 24 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local privilege escalation in Genetec Update Service. An authenticated, low-privileged, Windows user could exploit this vulnerability to gain elevated privileges on the affected system. | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Genetec
Published:
Updated: 2026-02-26T14:44:07.658Z
Reserved: 2025-02-28T17:07:08.574Z
Link: CVE-2025-1789
Updated: 2026-02-26T14:30:43.060Z
Status : Awaiting Analysis
Published: 2026-02-24T20:27:42.597
Modified: 2026-02-24T21:52:01.367
Link: CVE-2025-1789
No data.
OpenCVE Enrichment
Updated: 2026-02-25T11:35:41Z